Data communication system and method
a data communication and data communication technology, applied in the field of data communication system and method, can solve the problems of inherently insecure and easy to be exploited, organisations are forced to take defensive measures, and existing session establishment for tcp over ip networks is inherently insecur
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
first embodiment
[0038]FIG. 2 is a schematic diagram of a data communications system according to the present invention.
[0039] A first communication system 100 is connected to an insecure network 110 and communicates using TCP. However, the first communication system 100 is configured to not acknowledge, reply or otherwise give away its existence to new incoming TCP traffic. As described with reference to FIG. 1, in a standard TCP communication system if a connection request is received in the form of a SYN TCP packet, the communication system would give away its existence by replying. In the present embodiment, upon receipt of such a SYN packet (or indeed any other unexpected packet type), the first communication system 100 does nothing. Preferably, the first communication system 100 discards such packets. Thus, potential attackers are not able to implement DoS attacks and the like.
[0040] In order to establish a connection with the first communication system 100, a second communication system 120 ...
second embodiment
[0042]FIG. 3 is a schematic diagram of a data communications system according to the present invention.
[0043] The second embodiment operates in a similar manner to the first embodiment, as discussed with reference to FIG. 1. However, instead of it being reliant on the second communication system 120 to follow the connection request message 130 with a TCP SYN packet 140, the first communication system 100 instead instigates the handshake by sending the SYN packet 140 upon receipt of a valid connection request message 130.
third embodiment
[0044]FIG. 4 is a schematic diagram of the present invention.
[0045] In this embodiment, the first communication system 100 is configured to require more than a valid connection request message 130 of a predetermined format to permit a connection. The connection request message 130 is preferably used by the second communication system 120 to transmit data content that is examined by the first communication system 100 to authenticate the first communication system 120. Authentication may, for example be dependent on the first communication system 120 providing one of a number of approved identities, network addresses, passwords or other authentication data. Alternatively, or in addition, authentication may include the first communication system sending a response message 150 to the address of the second communication system 120, which the second communication system 120 must reply to in a further response message 160. In this example, the response message may include a code that must ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


